Analysis
-
max time kernel
94s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
ded4fa0df0efdc77ecf3c0e30c6120b6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ded4fa0df0efdc77ecf3c0e30c6120b6.exe
Resource
win10v2004-20231215-en
General
-
Target
ded4fa0df0efdc77ecf3c0e30c6120b6.exe
-
Size
241KB
-
MD5
ded4fa0df0efdc77ecf3c0e30c6120b6
-
SHA1
c532b843f754b62105f8563bd0d0dbd3d242c8fa
-
SHA256
8fd3705f915e8f625cfab35232ad085519684aa70d00aaa6754376e4b5f13baf
-
SHA512
b995187ed944de69702e1c60c6612d357dba73c218723e1036383338e8989d242aebc2fa88f41d591a4291b88938d0f5c66bab84f443377a018d248eb13baca5
-
SSDEEP
6144:Zc1SBpZRBZxzszqDfObIspG3o0Lz+hVkErdWRiE/g9TsK4p3sH:ZcEB1rxzO6OUsWLmrkMagGK4hm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe -
Executes dropped EXE 1 IoCs
pid Process 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 10 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2808 ded4fa0df0efdc77ecf3c0e30c6120b6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2808 ded4fa0df0efdc77ecf3c0e30c6120b6.exe 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4232 2808 ded4fa0df0efdc77ecf3c0e30c6120b6.exe 85 PID 2808 wrote to memory of 4232 2808 ded4fa0df0efdc77ecf3c0e30c6120b6.exe 85 PID 2808 wrote to memory of 4232 2808 ded4fa0df0efdc77ecf3c0e30c6120b6.exe 85 PID 4232 wrote to memory of 5028 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe 86 PID 4232 wrote to memory of 5028 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe 86 PID 4232 wrote to memory of 5028 4232 ded4fa0df0efdc77ecf3c0e30c6120b6.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ded4fa0df0efdc77ecf3c0e30c6120b6.exe"C:\Users\Admin\AppData\Local\Temp\ded4fa0df0efdc77ecf3c0e30c6120b6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\ded4fa0df0efdc77ecf3c0e30c6120b6.exeC:\Users\Admin\AppData\Local\Temp\ded4fa0df0efdc77ecf3c0e30c6120b6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ded4fa0df0efdc77ecf3c0e30c6120b6.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD59dc00d797f03c6914cbc4de6be95001e
SHA1cd5386b3550ba47da358ea861c618adaaa4b7f53
SHA2561533da97223978918ba801a1e363e8d631ea2dc89215aaa721aae2e3a55ca9e5
SHA5123ea217dfc47eb311912d566c25cc734a7584f0cb5c3c863c54b1693aedb1cbec86dc5db2dc5cc8df938cafcc19fc19e3ea4332f59ee8ea485d828c64e9575033